Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

SMiShing: A New Mobile Computing Scam

SMiShing: A New Mobile Computing Scam

Chances are, you’ve heard of phishing before--emails that promise some benefit or prize if you only click on the included link, that actually only results in trouble for you and your data. Unfortunately, as technology has embraced mobility, so have phishing attempts. This is why you must also be aware of SMiShing scams.

What Is SMiShing?
SMiShing is a mobile variant of phishing that involves the use of a text message, rather than an email, to catch the target in the phisher’s net. These attacks are highly reliant on the target’s compliance with the instructions the cybercriminal provides, as well.

These attacks can be more effective than the typical phishing attack, as the general public is increasingly aware of cyber threats--yet don’t expect these threats to manifest in their cell phone.

Just as one would experience in the ‘typical’ phishing attack, a ‘smisher’ will likely try to gain your trust in order to extract credentials. This ultimately allows them access to the accounts they obtained the credentials for, permitting them to wreak havoc and/or steal what they please. This is especially dangerous if they gain access to any client financial information you may have on file. Alternatively, some smishers will claim that if you don’t access a link and enter your personal information, that you will be charged daily for some service. Naturally, if this service is one that your organization has not signed up for, this message should be reported to IT and then disregarded.

How To Spot SMiShing Scams
First, if you suspect that a message is fraudulent, it never hurts to reach out to confirm that the message was sent by who it seems to have been. To do so, reach out via a different channel than your text, such as calling an official service number to speak directly to a representative. This allows you to confirm that the message was legitimate or fraudulent without exposing yourself or the business to greater risk.

In essence, avoid responding to text messages from senders that you don’t know--especially when the number is a 5000 number. This indicates that the message was actually an email sent as a text message, which is often a tactic used by scammers.

Finally, keep an eye out for any messages that contain downloadable apps. These are a favorite method to introduce malware to a mobile device. If an app doesn’t come from an official app store, it is likely a piece of disguised malware.

How To Be The Most Safe
If in doubt, confirm before you answer. Additionally, a VPN (or virtual private network) can help you maintain your mobile security, especially when paired with the practices outlined above.

Voyage Technology can help you to put these safeguards, and others, in place for your business devices. Give us a call at 800.618.9844 to get started.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, 14 December 2025

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Efficiency Network Security User Tips Internet Malware IT Support Privacy Google Workplace Tips Computer Phishing Email IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Small Business Productivity Backup Quick Tips Passwords Cybersecurity Saving Money Communication Managed Service Data Backup Smartphone Android Upgrade Data Recovery Business Management Smartphones AI VoIP Mobile Devices communications Disaster Recovery Windows Social Media Browser Microsoft Office Managed IT Services Network Current Events Tech Term Remote Internet of Things Miscellaneous Information Automation Artificial Intelligence Facebook Gadgets Cloud Computing Covid-19 Holiday Training Remote Work Server Managed Service Provider Compliance Outsourced IT Encryption Spam Employee/Employer Relationship IT Support Office Windows 10 Government Business Continuity Data Management Virtualization Blockchain Wi-Fi Business Technology Bandwidth Windows 10 Data Security Apps Vendor Two-factor Authentication Mobile Office Networking App Employer-Employee Relationship BYOD Chrome Mobile Device Management Budget Tip of the week Gmail Managed Services Voice over Internet Protocol Apple How To BDR Computing Information Technology HIPAA Hacker Applications Avoiding Downtime Office 365 Marketing Access Control Conferencing WiFi Managed IT Services Big Data Operating System Risk Management Computers Router Virtual Private Network Analytics Website Office Tips Health Augmented Reality 2FA Help Desk Storage Password Retail Bring Your Own Device Healthcare Social Cooperation Free Resource Going Green Project Management Windows 7 Patch Management Cybercrime Save Money Microsoft 365 Remote Monitoring End of Support Vulnerability Vendor Management Solutions Customer Service Physical Security Display Printer Windows 11 Paperless Office Infrastructure Monitoring Excel Firewall Document Management Remote Workers Telephone The Internet of Things Scam Data loss Vulnerabilities Entertainment Data Privacy Images 101 Settings Printing Wireless Robot Mobility Telephone System Content Filtering Multi-Factor Authentication Cost Management Customer Relationship Management YouTube Cryptocurrency Hacking IT Management Presentation VPN Employees Meetings Integration Virtual Desktop Data storage LiFi Wireless Technology User Tip Modem Computer Repair Mobile Security Processor Outlook Holidays Money Data Storage Smart Technology Supply Chain Humor Word Video Conferencing Machine Learning Managed Services Provider Professional Services Saving Time Virtual Machines Sports Mouse Managed IT Service Safety Maintenance Administration Antivirus Downloads iPhone Licensing Multi-Factor Security Tech Human Resources Legal IT solutions Social Network Telework Cyber security Tablet IoT Communitications Dark Web Cables Business Growth CES Application Trends Supply Chain Management Alert Dark Data Google Calendar Term Google Apps Managed IT Customer Resource management FinTech Cortana File Sharing Regulations Star Wars IT Assessment How To Microsoft Excel IT Maintenance Alt Codes IBM Data Analysis Downtime Gamification Flexibility Notifications Staff Value Business Intelligence Legislation Shortcuts Hosted Solution Organization Travel Social Networking Google Maps Smart Devices Ransmoware Typing Techology Fileless Malware Digital Security Cameras Content Remote Working Wearable Technology Memory Vendors Comparison Google Play Be Proactive Google Drive Competition Health IT Knowledge Unified Threat Management Motherboard Data Breach Assessment Electronic Health Records Permissions Workforce Unified Threat Management Directions Videos 5G Wasting Time Threats Network Congestion Specifications Security Cameras Workplace Strategies Google Docs Unified Communications Experience Trend Micro Running Cable User Internet Exlporer Software as a Service Fraud Meta Bitcoin User Error Microchip Google Wallet Username Managing Costs Amazon Black Friday SSID Point of Sale eCommerce Laptop Database Surveillance Virtual Assistant Outsource IT Windows 8 IP Address Drones Network Management Tech Support IT Technicians Virtual Machine Environment Media Monitors Cyber Monday Medical IT Proxy Server Reviews Cookies Halloween Recovery Tactics Development Hotspot Transportation Small Businesses Hard Drives Websites Mirgation Hypervisor Displays PowerPoint Domains Shopping Nanotechnology Optimization Scary Stories Addiction Electronic Medical Records Language Employer/Employee Relationships Outsourcing Hacks SharePoint Refrigeration Management PCI DSS Fun Chatbots Navigation Writing Distributed Denial of Service Workplace Deep Learning Public Speaking Lenovo Gig Economy Screen Reader Service Level Agreement Internet Service Provider Virtual Reality Computing Infrastructure Teamwork Hiring/Firing Lithium-ion battery Education Server Management Regulations Compliance Entrepreneur Private Cloud Identity Evernote Paperless Co-managed IT Superfish Bookmark Identity Theft Smart Tech Memes Download Net Neutrality Twitter Alerts SQL Server Technology Care Mobile Computing Undo Financial Data Search Error History Business Communications Connectivity IT Social Engineering Break Fix Scams Best Practice Browsers Smartwatch Buisness Upload Procurement Remote Computing Azure Hybrid Work

Blog Archive